Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple iphone os 1.1.4 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2008-4232
Safari in Apple iPhone OS 2.0 up to and including 2.1 and iPhone OS for iPod touch 2.1 up to and including 2.1 does not restrict an IFRAME's content display to the boundaries of the IFRAME, which allows remote malicious users to spoof a user interface via a crafted HTML docu...
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0
Apple Safari
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1
Apple Iphone Os 1.0.1
Apple Iphone Os 2.1
Apple Iphone Os 2.0
Apple Iphone Os 1.1.5
Apple Iphone Os 1.1.4
Apple Iphone Os 2.0.2
Apple Iphone Os 2.0.1
4.9
CVSSv2
CVE-2013-5142
The kernel in Apple iOS prior to 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 5.0.1
4.9
CVSSv2
CVE-2013-3953
The mach_port_space_info function in osfmk/ipc/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.2.5
4.7
CVSSv2
CVE-2013-5138
IOCatalogue in IOKitUser in Apple iOS prior to 7 allows malicious users to cause a denial of service (NULL pointer dereference and device crash) via a crafted application.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.0.1
4.6
CVSSv2
CVE-2013-0977
dyld in Apple iOS prior to 6.1.3 and Apple TV prior to 5.2.1 does not properly manage the state of file loading for Mach-O executable files, which allows local users to bypass intended code-signing requirements via a file that contains overlapping segments.
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0.2
Apple Iphone Os 3.0
Apple Iphone Os 5.0.1
Apple Iphone Os 2.2
Apple Iphone Os
Apple Iphone Os 5.1
Apple Iphone Os 4.0
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.3
4.6
CVSSv2
CVE-2012-3736
The Passcode Lock implementation in Apple iOS prior to 6 allows physically proximate malicious users to bypass an intended passcode requirement via vectors related to ending a FaceTime call.
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 1.1.4
4.6
CVSSv2
CVE-2010-0038
Recovery Mode in Apple iPhone OS 1.0 up to and including 3.1.2, and iPhone OS for iPod touch 1.1 up to and including 3.1.2, allows physically proximate malicious users to bypass device locking, and read or modify arbitrary data, via a USB control message that triggers memory corr...
Apple Iphone Os 3.1.2
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.2
Apple Iphone Os 2.0
Apple Iphone Os 1.0.1
Apple Iphone Os 2.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0.1
Apple Iphone Os 1.1.4
Apple Iphone Os 2.1
Apple Iphone Os 2.0.2
Apple Iphone Os 1.1.5
Apple Iphone Os 1.0.2
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1.1
Apple Iphone Os 3.0
Apple Iphone Os 1.1
Apple Iphone Os 2.2.1
Apple Iphone Os 1.0
4.3
CVSSv2
CVE-2013-5151
Mobile Safari in Apple iOS prior to 7 does not prevent HTML interpretation of a document served with a text/plain content type, which allows remote malicious users to conduct cross-site scripting (XSS) attacks by uploading a file.
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
4.3
CVSSv2
CVE-2013-5156
The Telephony subsystem in Apple iOS prior to 7 does not require API conformity for access to telephony-daemon interfaces, which allows malicious users to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.1
4.3
CVSSv2
CVE-2013-5149
The Push Notifications subsystem in Apple iOS prior to 7 provides the push-notification token to an app without user approval, which allows malicious users to obtain sensitive information via an app that employs a crafted push-notification registration process.
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 5.1.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
Apple Iphone Os
Apple Iphone Os 1.0.0
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 2.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »